|国家预印本平台
首页|Detecting speculative data flow vulnerabilities using weakest precondition reasoning

Detecting speculative data flow vulnerabilities using weakest precondition reasoning

Detecting speculative data flow vulnerabilities using weakest precondition reasoning

来源:Arxiv_logoArxiv
英文摘要

Speculative execution is a hardware optimisation technique where a processor, while waiting on the completion of a computation required for an instruction, continues to execute later instructions based on a predicted value of the pending computation. It came to the forefront of security research in 2018 with the disclosure of two related attacks, Spectre and Meltdown. Since then many similar attacks have been identified. While there has been much research on using formal methods to detect speculative execution vulnerabilities based on predicted control flow, there has been significantly less on vulnerabilities based on predicted data flow. In this paper, we introduce an approach for detecting the data flow vulnerabilities, Spectre-STL and Spectre-PSF, using weakest precondition reasoning. We validate our approach on a suite of litmus tests used to validate related approaches in the literature.

Graeme Smith

计算技术、计算机技术

Graeme Smith.Detecting speculative data flow vulnerabilities using weakest precondition reasoning[EB/OL].(2025-04-27)[2025-05-07].https://arxiv.org/abs/2504.19128.点此复制

评论